Tag Archives: web application

10 Types of Security Vulnerabilities for Web Applications

SaaS Businesses. Online Banking. Subscription-based websites. E-commerce. Social Media. What’s common in all of them?

They are all cloud-based businesses that work at the heart of information systems, delivering products and services online. These businesses need to use web applications to handle or transact money and exchange sensitive information.

However, applications may get compromised as a result of weak or poorly selected security mechanisms that pose opportunities for hackers.

Application-layer attacks come in many forms and are arguably more complex than most network-layer attacks owing to a large number of protocol and communication formats increasing at a rapid rate.

Here we unveil the top 10 security threats that may arise as a result of poor security and data practices:

1. Injection

Script injection issues result from bad programming practices and can direct unfiltered data being passed on to browsers, servers, or any other location. Attackers can easily insert commands into these vulnerable entities resulting in massive data loss.

As a precaution, any data received from unknown resources should be filtered using a whitelist, which is a crucial step to consider for all applications. If you rely only on filtering functions of your framework, they need to be intensively scrutinized to protect web assets. Application security testing can help in detecting injection flaws by using parameterized queries during coding, developers can prevent such vulnerabilities.

2. Broken Authentication

A broken authentication can lead to several security-related issues. This usually occurs when outdated authentication is rooted in codes that was used several years back.

There may be other vulnerabilities such as passwords not encrypted during storage or transit, URLs containing session ID that may get leaked in the referrer header, session fixation, hijacking of the session, and predictable session IDs.

You can mitigate this vulnerability by using a safe and secure framework. In most use cases, it can be implemented easily. Even if you aim to roll your own code, you should be well-prepared and equipped with the knowledge to avoid any failure in the future.

3. Sensitive Data Exposure

Sometimes, web applications are affected by crypto and resource vulnerabilities. This makes sensitive data available to hackers. The only way to prevent this is to encrypt data at all times. All sensitive information such as credit cards and passwords should be encrypted and hashed for an added layer of security.

For data in transit, you should use HTTPS with a proper certification while storage should be handled in a proper way.
Do not store any sensitive data that you rarely need. If you do store credit card information, it needs to be PCI-compliant. A good way is to sign up with a payment processor.

4. XML External Entities (XXE)

An attack from XML External Entities can happen if it is processed by an XML processor that is weakly configured. This can lead to leakage of confidential data, server-side request forgery, service denial, and severe system impacts.

Such attacks can also disclose sensitive files. Most attackers can pivot any trusted application to internal systems, making information vulnerable.

You can remove this vulnerability through a secure configuration of XML Unmarshaller. External entities are blocked to enter your system as a component of any incoming document.

5. Broken Access Control

Broken Access Control may happen in applications and APIs that fail to verify user request privileges. When applications have trouble applying robust security mechanisms for authentication, they can witness control vulnerabilities.

If there are missing restrictions on authorized users, they can access unauthorized data or functionality and also modify data and access rights.

Penetration testing is important to detect non-functional access controls. The control can happen at different levels, including physical, logical and administrative. A central application component for verification of access control ensures that every request is verified to access or deny the information.

6. Security Misconfiguration

Misconfiguration of web servers and applications isn’t a new phenomenon. It prevails due to the various ways in which attacks can occur. Classic examples of security misconfiguration include — a directory listing enabled on the server, an application running with debug enabled, unnecessary services running on the system, using default keys, using outdated software, and sharing sensitive error handling information to imposters.

Build and deploy robust processes to run tests and prevent vulnerabilities in code. Using Dynamic Application Security Testing (DAST), leaky APIs and other misconfigurations can be easily detected.

7. Cross-Site Scripting (XSS)

When client-side script is targeted by injection of code into an application’s output, there can be cross-site scripting errors. For example, JavaScript tags may be given on the input which is returned to the user unverified.

These inputs may get executed by the browser and scripts on the loading page can post the cookies to an attacker. As a result, user sessions can be hijacked and directed to malicious websites.

You can mitigate this vulnerability if you decide not to return HTML tags to your users. This defends your system against HTML injections as well. Get the characters converted into their escaped counterparts to prevent this error.

8. Insecure Deserialization

When web applications and APIs deserialize tampered objects shared by an attacker, the system becomes vulnerable to this flaw. It can lead to attacks on objects and data structure where application logics are altered by the attacker.

Also, it includes typical data tampering in which the existing data is used but its content gets altered. This insecure deserialization can be used in wire protocols, caching applications, inter-process communications, cache servers, file systems, API authentication tokens, and HTTP cookies.

You can prevent serialization by using integrity checks on serialized objects, using mediums that permit primitive data only, isolating the code in low-privileged environments, restricting the network connectivity, and using strict type constraints.

9. Using Components with Known Vulnerabilities

When incorporating new code, it is important to ensure security audits. Codes coming from unknown and unreliable resources may come with a web security vulnerability that you can’t avoid. For example, WordPress plugins that can find the hidden installations and the third-party software remain unpatched for a long time.

When using the third-party or open source components, you should stay cautious and inspect every code minutely to look for the extreme vulnerabilities.

10. Insufficient Logging and Monitoring

When security-critical applications aren’t logged safely, they become prone to this flaw. The lack of functionalities like monitoring current events can further elevate the issue. It becomes difficult to identify the attacker and implement an effective incident handling mechanism.

To prevent this vulnerability, you should ensure that access control failures, logs, and server-side input validation failures are properly logged for identifying malicious accounts. Whatever format you use for log generation should be easily integrated into the centralized log management system. Further, high-value transactions should be backed by an audit trail to prevent tampering while you also place a recovery and incident response plan in action.

By being aware of the security vulnerabilities of your applications, you can take the necessary steps and practice mechanisms that protect your data from potential attacks. Regular security audits and proper testing can go a long way in keeping your critical data safe.


The Scrum Way: A Definitive Approach to Building Things

Scrum as an agile framework is the collaborative effort of a number of self-organizing and cross-functional teams who work along their end users and customers.

The method makes use of adaptive planning, development, delivery and continuous improvement along with flexible and rapid response to change.

When using the agile framework for developing software, a team of 3 to 9 developers gather as main users and divide their work into smaller schedules. These schedules are time-boxed iterations, known as ‘sprints’, which can be tracked and re-planned depending on evolving user requirements.

One way of continuous tracking is with the help of a 15 minute meeting known as Daily Scrums. In order to coordinate the work of multiple scrum teams in a larger organization it requires them to use Large-scale Scrum (LeSS), scrum of scrums and Scaled Agile Framework (SAFe).


 The Key Idea Behind Scrum

 Scrum provides a context in which companies are given an opportunity to address complex adaptive problems, while delivering products of highest value whilst making use of their resources productively and creatively.

It is a highly effective team collaboration tool for managing complex products.

Ken Schwaber and Jeff Sutherland, the creators of Scrum in their resource ‘The Scrum Guide’  explain the working model and usefulness of Scrum clearly. Some of its characteristic features include:


  • Light weight
  • Simple to understand
  • Difficult to master

It might sound complicated, but Scrum is rather simple. It is not a methodology. Rather, it implements the scientific method of empiricism. With the help of a programmed algorithmic approach, it makes easy for people and self-organizations to deal with unpredictability and complex problems.


The Scrum Values

 Scrum values were added to the Scrum Guide in July 2016. Some of the Scrum values include: focus, courage, commitment, openness and respect.


Roles of the Scrum Team



A distinct Scrum Team is composed of a Product Owner, a Scrum Master and the Development Team.

The self-organizing teams decide how to do their work as a self-sufficient group rather than taking instructions from people. On the other hand, cross functional teams have a wide variety of elements in it so that it can complete the work on its own.


 5 Formal Scrum Events For Inspection and Adaptation

 Scrum is modeled to work by optimizing flexibility, productivity and creativity.

 For companies who regularly use Scrum in order to reduce the need of conducting meetings. All of the events are time-boxed for saving productivity time. Once a Sprint begins, it is impossible to slow it down or stop it. There is no way that a Sprint can be stopped or its time length can be altered.

These five events are:

  • Sprint Planning
  • Daily Scrum
  • Sprint Review
  • Sprint Retrospective
  • The Sprint


1. Sprint Planning:

During Sprint Planning, the work allocated during Sprint is done and everyone in the team contributes to it. The time allotted to sprint planning is a maximum of 8 hours for deciding the goal of one Sprint lasting 1 month.

If the Sprint is shorter, lesser time is allocated to Sprint Planning. It is the duty of Scrum Master to ensure that every one of the Scrum Team is present in the planning process and understands the necessity of this drill. In addition it is ensured that the Scrum Team sticks to the allocated time frame.

Some of the answers that are sought during a planning session are:

  • What can be delivered by the upcoming Sprint?
  • How will the work be done in order to achieve the goal?

2. Daily Scrum

Daily Scrum is a daily 15-minute time boxed event in which all the members of the team meet and make plans for the next 24 hours in order to meet the ultimate Goal.


3. Sprint Review

After the end of every Sprint, a Sprint Review is set up for investigating whether the Goal was met in the stipulated time period, any bugs detected and to decide how to clear the Product backlog, if there is any.

Based on a Review, the team decides what steps need to be taken in order to optimize the value and decrease the incidents of Products backlog.


4. Sprint Retrospective

This event gives an opportunity to the Sprint team to inspect itself and create a plan that can be implemented next time for the next Sprint. This event occurs after Sprint Review and the time allotted to it is a maximum of 3 hours. If the Sprints are shorter, this event gets further shortened. Following points are considered during the event:

  • What went well during the Sprint
  • What factors can be improved


5. The Sprint:

Sprint has a defined time-box during which the job needs to be done. The time period fixed for a sprint is usually one month or less. As soon as one Sprint is over, another begins automatically. They have consistent duration throughout the project. Some of the features of Sprint are as follows:

  • No changes can be made that have the ability to endanger the Sprint Goal
  • Quality goals cannot be reduced
  • Scope can be clarified and re-negotiated between the Development Team and the Product Owner as the project progresses


The duration of Sprint is fixed to one month because if longer time is allocated to it, complexities might arise and therefore risks might increase. They help in increasing predictability and reducing risk.

Finally, Scrum is driven by feedback mechanism and stands on the three strong pillars of inspection, transparency and adaptation. It is all about humanizing the entire process of software development that can be optimized to create better products.